background image

Chapter 4

 

Maintenance

Summary of Contents for imageRUNNER 2870

Page 1: ...ageRUNNER iR2270 2870 3570 4570 iR Security Kit A2 COPYRIGHT 2004 CANON INC CANON imageRUNNER iR Security Kit A2 REV 0 PRINTED IN U S A DU7 1135 000 SEPT 2004 REV 0 SM cover iR Security Kit qxd 9 20 2004 2 41 PM Page 1 ...

Page 2: ... need arises In the event of major changes in the contents of this manual over a long or short period Canon will issue a new edition of this manual The following paragraph does not apply to any countries where such provisions are inconsistent with local law Trademarks The product names and company names used in this manual are the registered trademarks of the individual companies Copyright This ma...

Page 3: ...quiring care to avoid combustion fire Indicates an item prohibiting disassembly to avoid electric shocks or problems Indicates an item requiring disconnection of the power plug from the electric outlet Indicates an item intended to provide notes assisting the understanding of the topic in question Indicates an item of reference assisting the understanding of the topic in question Provides a descri...

Page 4: ...sed to indicate Low The voltage value however differs from circuit to circuit In addition the asterisk as in DRMD indicates that the DRMD signal goes on when 0 In practically all cases the internal mechanisms of a microprocessor cannot be checked in the field Therefore the operations of the microprocessors used in the machines are not discussed they are explained in terms of from sensors to the in...

Page 5: ...ling Disabling Display of Job Log 2 3 Chapter 3 Installation 3 1 Points to Note About Installation 3 1 3 1 1 Points to Note on Installation 3 1 3 2 Checking components 3 3 3 2 1 Checking Items in the Package 3 3 3 3 Installation procedure 3 4 3 3 1 Backing Up Data 3 4 3 3 2 Obtaining and Registering the license key 3 8 3 3 3 Setting the Service mode 3 10 Chapter 4 Maintenance 4 1 Related Service M...

Page 6: ...Chapter 1 Specifications ...

Page 7: ...Contents Contents 1 1 Product composition 1 1 1 1 1 Product Components 1 1 1 2 Specifications 1 3 1 2 1 Overview 1 3 ...

Page 8: ... keys being different from conventional activation measures that use dongles and PCs Whereas the details of its management differ among countries and regions it is designed assuming the users access it and activate licenses by themselves respectively Per optional product the license access number certificate sheet is supplied Per license access number a user can get a license key and activate the ...

Page 9: ...will invalidate the optional functions on the source iR device and at the same time proof of invalidation will be generated within the device in the form of an invalidation license key The user may then communicate the indicated invalidation license key the serial number of the original iR device and the serial number of the new iR device to the Sales Company which in turn may issue a new license ...

Page 10: ...mporally image data like scanned images and PDL data etc at any time Also the image data is always saved in the user box FAX box etc If the user information like the image data is stolen by extracting HDD the original data can be recovered easily by directly accessing and analyzing with Disk Editor etc For the security HDD encryption and full initialization of the HDD are used HDD encryption Regar...

Page 11: ...ntents of the PDL printing and contents of transmission reception using Send function can be prevented from leaking By setting Service mode User mode of whether to display Job Log is displayed For details refer to New Functions in the later chapter ...

Page 12: ...Chapter 2 Functions ...

Page 13: ...Contents Contents 2 1 New Function 2 1 2 1 1 Security Function 2 1 2 1 2 HDD Encryption 2 1 2 1 3 Full Initialization of the HDD 2 2 2 1 4 Enabling Disabling Display of Job Log 2 3 ...

Page 14: ... HDD will be too difficult This function is automatically enabled when the license key registration of the security kit is completed You cannot disable this function Mechanism of data encryption Data encryption uses 3DES encryption algorism with a data encryption key When the security kit is started its operations the data encryption key is generated based on random numbers in the device Then when...

Page 15: ... power is displayed on the screen When starting or stopping the security kit operation note that data in the areas to be deleted are all deleted If all data is deleted or there are much data remained when the power is turned OFF it takes much time to start up Note Data deletion at the installation When the security kit is installed processing to fully initialize HDD automatically is executed There...

Page 16: ... Log 0008 5639 Function You can disable the display of logs Job Log stored by the machine It affects not only the local UI but also the remote UI It is important to keep in mind that log collection job account log fax communication log otherwise possible with a specific Canon application NetSpot Accountant etc will no longer be available as there will be no response to a command for data collectio...

Page 17: ... be displayed depends on whether the function is enabled or disabled in user mode User Mode Items Ad Func System Settings Job Log Display on off on enable display of Job Log default off disable display of Job Log Service Mode Item COPIER Option USER LGSW DSP 0 disable display in user mode default 1 enable display in user mode Changing the setting from 0 to 1 enables to display in user mode Change ...

Page 18: ...Chapter 3 Parts Replacement Procedure ...

Page 19: ...3 1 3 1 1 Points to Note on Installation 3 1 3 2 Checking components 3 3 3 2 1 Checking Items in the Package 3 3 3 3 Installation procedure 3 4 3 3 1 Backing Up Data 3 4 3 3 2 Obtaining and Registering the license key 3 8 3 3 3 Setting the Service mode 3 10 ...

Page 20: ... a person in charge of user s device administration that the data shown below is all deleted if any of the actions above is taken and induce user to backup necessary data In the light of security a service person should not backup user s data For reference a backup procedure is shown in this manual Data to be deleted Data stored in the Mail boxes Address information registered to address book Scan...

Page 21: ...user use data registered in the iR machine Refer to Reference Guide for the device information delivery function Data stored in MEAP applications Stored data may be backed up depending on MEAP application For details check the Instruction Manual of each application Passwords for the user box the fax box and the system box are once cleared when a license key is registered Therefore be sure to regis...

Page 22: ...3 2 Checking components 3 2 1 Checking Items in the Package 0008 2781 F 3 1 1 License Access Number Certificate Sheet 1pc 2 Reference Guide 1pc 3 Caution sheet for Users 1pc 4 License Registration Booklet 1pc 1 2 3 4 ...

Page 23: ...ministrator ID and a password are set up Enter a system administrator ID in the user name field and a password in the password field Click OK 3 Click address book 4 Select address book and format of files and click Start Export 5 Specify a storage location of the files according to the screens Name files to easily identify a file and its page of address book Memo All information in address book is...

Page 24: ...ngs Refer to Device Information Delivery in the Reference Guide 1 Make settings of a master machine i e transmission side Register destinations of device information to the master machine Select Additional Functions System Settings Device Information Delivery Settings Register Destinations 2 Register destinations manually automatically In the case of auto search select destinations from search res...

Page 25: ...ty kit is yet to run it does not work properly It is absolutely necessary to match operating conditions of the security kit before and after backup work For that reason backup is impossible with the MEAP backup function while installing the security kit The following procedures are for stopping MEAP applications disable licenses and downloading license files Refer to the MEAP SMS Administrator Gui...

Page 26: ...using application files jar file of applications and the backed up disable license files lic file User authentication information registered in SDL Simple Device Login When user changed a login application of MEAP to SDL backup of user authentication information is necessary according to the following procedure 1 Access the following URL http Device IP Address 8000 sdl 2 Login using user name and ...

Page 27: ...situation will be various in countries or regions When purchasing an option a license access number certificate sheet is packaged with the option The access number is used to obtain a license key which is specific to the number Users can access to the Web server the LMS itself with the number and obtain the license key With the license key is registered to the iR device the function of the option ...

Page 28: ...hat the license key is registered and the function of the option is validated If the function fails to be validated an error message will be displayed Refer to the followings what action to be required There are not enough required features for install Check if the USB Application Interface Board D1 is recognized correctly and also check if the RAM capacity is 512MB The value for the license key i...

Page 29: ...s the device configuration to check if the security kit is displayed in the space of options Then set the Service mode at user s request 3 3 3 Setting the Service mode 0008 2981 When this kit is installed the Service mode needs changing in response to the user s request 1 Changing the setting of Complete erasing of HDD Change the setting of complete erasing of HDD at user s request Service mode le...

Page 30: ...nages the device using the job history cannot be used 3 OFF ON of connection devices When the setting of the Service mode is changed need to turn off on the power of connection devices 1 Press the power switch on the control unit for 3 seconds or more 2 Following the instructions displayed on the shutdown sequence step by step with operations to select appropriate items on the touch panel so that ...

Page 31: ... 12 F 3 2 4 Turn the main power on Memo If the target data to be erased completely remain in the HDD at the time of turning off the main power the erasing operation will be carried out at the start up 3 2 1 ON OFF ...

Page 32: ...Chapter 4 Maintenance ...

Page 33: ...Contents Contents 4 1 Related Service Mode 4 1 4 1 1 Invalidating the License for Transfer to a Different 4 1 ...

Page 34: ...nally or inadvertently Invalidation Procedure Invalidation consists in invalidating the license in service mode and generating an invalidation certificate that proves the completion of invalidation Invalidation may take place for individual optional functions and a specific function becomes no longer available as soon as an invalidation certificate is issued The user contacts the Sales Company and...

Page 35: ...ntified as 1 under A To invalidate an option for transfer select it and type in 0 under B then click OK so that the option will be invalidated and an invalidation certificate will be issued TR xxxx indicates any invalidation certificates that have been generated under C xxxx may be any of the following ...

Page 36: ... will change to 0 3 Thereafter when OK is pressed the indication under A will change to 0 and at the same time an invalidation certificate will be indicated in the form of a number Take note of it in writing together with the serial number of the target device 4 When the target device is ready check its serial number 5 Contact the Sales Company and provide the following invalidation certificate fo...

Page 37: ......

Reviews: